END-TO-END ENCRYPTION Syllabus GS Paper 3 – Sci and Tech)

News-CRUX-10     29th January 2024        

Context: End-to-end encryption has revolutionized the perspectives of human rights organizations, law enforcement agencies, and technology companies regarding their access to and utilization of information by safeguarding it comprehensively.


  • About: It is the act of changing some consumable information into an unconsumable form based on some rules.

E2E Encryption

  • About: E2E is encryption that refers to particular locations between which information moves.
  • Encryption in Data Privacy: The term "encryption" is commonly associated with ensuring the privacy of stored data.
  • Data Protection: Encryption safeguards data from unauthorized access or tampering by converting it into a secret code decipherable only by the intended recipient.
  • Versatile Applications: Encryption proves beneficial in securing online communications, storing sensitive information, and verifying digital identities across various scenarios.
  • Symmetric Encryption: In this encryption, the same key is used for both encrypting and decrypting data, ensuring that the key used for encryption is also required for decryption.
  • Asymmetric Encryption: In this encryption utilizes a pair of keys - one public and one private. The public key can be shared openly, while the private key must be kept confidential.